S-L .: . ... ...... . . .. . .. .. . . ...... . .. .. . ,-. . ... ... .............. ...................... . ., · . ~~~~~~~:: · .' ... r. - :.. :;:.:-.. . . ::'; : : : -- . i--- ,, . .,. - ; ' " ;,.' :'--0 ": -. : :'! :~~~~~~~~, - .-;:. .:-.. 00 i- Ti· ;· ·: :·; ,- ; f ,. ....... ,, D;f :0l-· : 0: :''d; , "f;:;::0! :0: ·I L:_ :.;: ".;:.. ,! " . . .~ .-. , .~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~7 o~ ,.,.r:,.- ": . : :- ,-.(~' -::-: Ij0:0: : :~::: - :~i-:- .,,-.- mR X~ eRESs . ;.i· · ; ii ··-. ;'r -·. -. - I: ·i ;.... ··;(·; 1·: i --"·' ' i· ;; .1 : -.·-- ·i )`· :· - . .·. .-1. .··--. ·· _: .·- I .i:l.--r-.-- i· ·. II INSTITUTE cHUS OF. T.cHNOLOG A Distributed Poisson Approximation For Preempt-Resume Clocked Schedules by J. Keilson and L.D. Servi OR 170-87 September 1987 I r r A DISTRIBUTED POISSON APPROXIMATION FOR PREEMPTRESUME CLOCKED SCHEDULES J. Keilson* University of Rochester Rochester, New York L. D. Servi GTE Laboratories Walthan, Mass ABSTRACT Many telecommunication systems with time-critical requirements use a preemptive-resume clocked schedule. An approximation to the ergodic distribution of the time to completion of a low priority task is obtained by treating the preemptive service time distribution as the limit of compound Poisson distributions. Explicit formulae for the first two moments are given which are highly accurate. For random clocked loads, a stochastic bounds is provided for the discrepancy between the exact and approximate distributions. For deterministic clocked loads, sample path bounds are found. Finally, simulation results are exhibited to demonstrate the accuracy of the model. * Now at The Sloan School of Management, Massachusetts Institute of Technology, 50 Memorial Drive, Cambridge, Massachusetts 02139 * The first author acknowledges the support by the IBM Program of Support for Education in the Management of Information Systems. 4 L O C 1. INTRODUCTION Computer systems and telecommunication systems must often perform ordinary tasks together with priority tasks arriving at periodic epochs kA which have strict timecritical requirements. To meet these requirements, the ordinary tasks are interrupted preemptively by the priority tasks and resumed only after their completion. Such a "clocked" schedule degrades the performance of the ordinary tasks and this degradation must be quantified accurately. Schedules of this type have been treated previously in [Fl] and [F2]. There, the authors introduce two approximations: (i) Using [F3] they approximate the waiting time of a D/G/1 queue with an exponential distribution, (ii) They approximate the amount of backlog that can be worked off in n clock intervals as normally distributed when n is large. The conclusion is an expression for the delay in terms of the error function. An alternative approach may be found in [Al] where a set of Lindley-like vector equations describing the clocked schedule are identified and then solved using Fast Fourier Transforms [Al] or Levinson's method [A2]. This method of solution requires considerably more computation but is exact. The interactions between an M/G load and a preemptive D/G load through a common single server have also been studied exactly in [01], [02], [03], [S1], [S2] giving rise to structural insights of a somewhat complex nature. One simple relationship found is an upper and lower bound for the delay of an M/M stream by a preemptive D/D stream [02]. The exact analysis of the system needed is intrinsically difficult. The difficulty arises from the mismatch between the discrete periodic input epochs of the priority tasks and the Poisson arrival epochs of the input process. For a certain broad class of priority task distributions Al(x), a simplifying property of infinite divisibility (defined below) is present. This property will be seen in §3 to permit the priority cumulative load process to be approximated with great fidelity as a compound poisson process or as the limit of a sequence of such processes. The system one must then investigate is an M/G/1 system with two classes of customers and preempt-resume discipline. This permits direct application of the results in [KS 1]. In particular simple expressions are obtained for the mean and variance of the steady-state delay of the ordinary customers. This approach is unlike the diffusion approximation in that the latter matches only the first two moments of the load. In our approximation, there is no appeal to the Central Limit Theorem nor are the natural discontinuities induced by tasks suppressed by the sample path continuity of the diffusion approximation. 5 The simplicity of the M/G/1 apparatus permits one to find sample path bounds and simple stochastic bounds for the discrepancy between the backlog of the approximate system and that of the real periodic system. The accuracy of the distributed approximation is validated through these bounds as well as simulation results. 2. THE SYSTEM The system consists of a single server and two service classes: a) ordinary tasks arrive in a Poisson stream of rate X2. The tasks have i.i.d. service times T 2 with c.d.f. A 2(x), and tansform a 2(c) = E[exp(-cT 2 )]; b) priority tasks arrive at clock epochs kA, k = 0,1,2,.... These tasks have i.i.d. service times T 1 with c.d.f. Al(x) and transform otl(c) = E[exp(-oTl)]; the priority tasks preemptively interrupt the ordinary tasks. These are resumed where left off when no priority tasks are present. The server backlog process BR(t) is Markov but is not time-homogeneous since the priority input is periodic. For any fixed e in [0, A), the discrete time process BR(kA+ 6) is Markov and for stable systems is ergodic. Correspondingly the delay of an ordinary customer arriving with phase 0 will have a steady state distribution. It will be assumed that the priority service time T 1 is infinitely divisible [ F] , i.e. that for every integer N, T 1 is distributed as the sum of N independent and identically distributed random variables. The simplest and perhaps most important priority task distribution of interest, the deterministic case, has this key property. It is well known [F], [S3] that such continuously distributed variates as the gamma, normal and mixture of exponentials have the property as do the discretely distributed deterministic, negative binomial, and Poisson variables. A variate having this property may be scaled and shifted without losing it. It follows that any variate concentrated in the neighborhood of some value with specified mean and standard deviation may be approximated by some shifted gamma or negative binomial variate having the same moments. Even though such a variate is theoretically unbounded, its extent can be kept small. By virtue of de Finetti's Theorem F]1 any infinitely divisible random variate is the limit in distribution of some sequence of compound Poisson variates. Let the cumulative priority (periodic) load process over an interval of length t be designated by X(t). Then, as we see next, de Finetti's Theorem assures that X(t) may be approximated 6 by a process with independent increments which is the limit of a sequence of compound Poisson input processes XN(t). The cumulative distribution of the priority load at clock ticks for both the actual system and the approximating system epochs will be, by construction, identical.. Indeed, X(kA) - X((k- 1)A) =d limN.[XN(kA) -XN((k- 1)A) ] =d T 1 for all k. Specifically, let (2.1) AN = N / A and let TAN be a random variable with transform aAN(s) = allN(s) (2.2) where al(s) is the transform of T 1. Then, as in the classical proof of de Finetti's Theorem [F], al(s) = lim Noo [ exp({-.AN A[1IAN(s)] ]. (2.3) and, from (2.2) the mean and variance of T 1, I.1 and o 12 , are related to AN and TAN by (2.4) a) l = lim N-..AXANE[TAN]; b) c 1 2 = lim N-o AXAN E [T 2AN ]. The preempt-resume clocked system is thereby approximated as the limit of a sequence of preempt-resume systems with two input streams, both having Poisson arrivals of finite rate. This treatment of the clocked load may be called the distributed Poisson approximation. A comparison of the real clocked system' and the distributed Poisson system approximation is needed to validate the approximation. For this comparison the following notation will be used throughout this paper. The distributed Poisson aproximation Here no load arrives at clock ticks. Instead the priority load arrives as a compound Poisson process. Let WAk(c,t) be the cumulanive priority load in [kA, kA +); Wk(co,t) be the cumulative ordinary load in [k kA +bt); IAk(co,') be the cumulative idle time for the server in [ kA, kA +); BAk(o,t) be the backlog of the approximate system at time kA + , 7 [0,A). The workoff rate in [0,) is (d/ds) BRk(co,¶) = -1. Then, for k= 0,1,... BA(Co,') = BAk(C, 0-) + WAk(co,t) + Wkk(C,t) + IAk (o,'t) - ', (2.5) ' e [0,) where BAk(c, 0-) is defined as BA(k.1)(O, A-) for kgO and as the initial system backlog if k=0. The real system. The cumulative ordinary load Wkk(o,t) is exactly the same. Tlk(co) is the priority load that arrives at kA- and, by construction equals WAk(co,A'). Let IR(co,'t) be the cumulative idle time for the server in [ kA, kA +r); BRpk(c,'t) be the backlog at time kA +', 'r e [0,A). The process BRk(c,'t) is taken to be be right-continuous with k = 1,2,...; BRO(C,O) = T1 0(co) (2.6) BRk(Co,O) = BRk(co, 0- ) + Tlk(co), (where BRk(o, 0-) is defined as BRk.l(c, A-) for k*0 and as the initial system backlog if k=0). The workoff rate in [0,A) is defined as (d/dt) BRpk(o,t) = -1. Then, for k = 0,1,... BRk(o,t) = BR(co, 0- ) + Tlk(CO) + WAk(oW,T) + IRV(,) - (2.7) , 't [0). The discrepancy between the backlog process of the real and approximate system is given by r [o0,). (2.8) Dk(co,t) = BRk(o,r) - BAk(co,), Then from (2.5) and (2.7) one has for k =0,1,... Dk(o,) = Dk(co, 0-) + Tlk(co) - WAk(o),t) + IRk(co,,) - IA(O,r), (2.9) r e [0,A). As previously noted the cumulative load of the approximate system over [kA, (k+1)A) equals the load arriving at the real system at t = kA-. Hence, Tlk(C) (2.10) with equality if = A. 8 , WAk(w,t) te [0), 3. RESULTS FOR THE DISTRIBUTED POISSON APPROXIMATION The system approximating the clocked system is equivalent to the limit of a sequence of systems SN parameterized by N. System SN is a single server system with a first stream of Poisson traffic with arrival rate XAN and service time TAN having preempt resume priority over a second stream of Poisson traffic with arrival rate %2and service time T 2. From [KS 1] the ergodic time in system for the lower priority traffic can be found. THEOREM 1: The ergodic time in system for the lower prioirty traffic has an expected value of (3.1) 2 /A X+ E[U2A] = 2 E[T]2 2 2(1-ps)(1-p l ) +E[T 2] 1-pi and a variance of (3.2) V2A = lim NooVar(U2N ) E[U2A] O 12 (1-Pl) 3 + As 2 4(1-p5 )2 + Var[T 2 ] (1-pl)2 E[T 2 3 ]AX, + E[T 1 3 ] + 3E[TI]ErT 2 ] - 2E 3 [T 1] A (1 - Ps) where (3.3) (3.4) A s = l12 / A + P1 =,/A, (3.5) Ps = g 1/A + 2E[T2J. and 2 E[T 2 2 ], Proof: See Appendix. , 4. DETERMINISTIC HIGH PRIORITY LOADS Of particular interest is the case where the high priority tasks are deterministic, i.e. where o12 = 0. This important case may be treated in a simple intuitive way which sheds light on the distributed Poisson approximation of §3 and provides a simple 9 rederivation of the more general result We observe that when the high priority tasks all have the same service time T 1, a sample path of the cumulative high priority load is a deterministic staircase function whose time average is a straight line with growth rate equal to pl1/A as illustrated in Figure 4.1. The staircase input is approximated by a high arrival rate of short loads. In the limit the cumulative high priority load would be a straight line with constant growth rate 1g/A as illustrated in Figure 4.2. For this approximation the system backlog process, designated by BA(t) and illustrated in Figure 4.3, has the compound Poisson input of the low priority customers arriving with service time T 2 at rate 2 and worked off at rate v = 1 - 1l/A. This approximating backlog process BA(t) would be identical in structure with the backlog process of the M/G/I queue if the work-off rate v were 1. If time were sped up by a factor (l/v), the new Poisson arrival rate would be X2# = X2 (1 - 1/A) -1, the low priority load would still be T 2 and the ergodic distribution of BA(t), would be unchanged since ergodic distributions are independent of time scale. The ergodic distribution is therefore described by the Pollaczek - Khinchine transform E[ exp (- (4.1) BA () ] P2 11- - a2(w) -- 1 - P2# oEFT23 where P2# = 2 #T 2 ' = %2 T 2 (1 - 91/A) 1 = P2 (1-Pl) 1. The mean backlog is therefore given by EIBA () ] - P; # 2(1 - 2#) ] £P~[T 2 2 "T- which simplifies to E[BA () ] (4.2) = 2 - p 2(1- s) T] where P2 = X2 E[T 2 ] and PS -= 2 E[T2 ]+ L /A. Note that PS = X2 E[T2]+ D1 /A < 1 corresponds to the stability condition P2# < 1. When a low priority task arrives at time t and finds a backlog y, it experiences a delay y divided by the work-off rate v. Hence WA(), the ergodic waiting time distribution of the low priority tasks, is given by WA(o) = BA(oo)/v and has transform E[exp(10 WA()C0/v]. The time to completion is given by WA(b) + E[T 2] / v and has transform E[exp(- (BA(O) + T 2 )0/v )] and a mean of U 2 = ( E[BA() ] + E[T 2 ] )v-1. (4.3) Note that (4.2) and (4.3) simplify to (3.1) for the case a12 = 0. This more intuitive argument does not extend to the non-deterministic case. If, for example, the premptive load at clock ticks were itself compound Poisson, the preemptive load process replacing it in our approximation would be a compound Poisson process with random jumps at its Poisson epochs. The full apparatus of [KS 1] is then needed. 5. ERROR BOUNDS FOR THE BACKLOG PROCESS Upper and lower bounds are provided for the discrepancy between the backlog BRk(t) for the real clocked schedule and that for the approximation BA(t) to the clocked schedule.The following two thereoms summarize the analysis given in the appendix of this paper. The thereoms provide stochastic upper and lower bounds for the error Dk(cO,') for random clocked loads, and provide a sample path bound as well as a time averaged error bound for deterministic clocked loads. THEOREM 2. Let Do(O-) = 0 and let Tlk be the i.i.d. random loads. Then one has (5.1) A <st Dk(r) <St T 1, E[ 0, A ), k = 0,1,.... where <st refers to a stochastic inequality. Proof: Using an induction argument with Prop. A.5 and Prop. A.6 one can show that A < Dk(o,0-) < 0 for k = 0,1,2.... Hence, from (A. 10) and Prop. A.6, (5.1) follows, THEOREM 3: Let Do(O-) = 0 and let Tlk be deterministic and independent of k with Tlk = T< A. Then one has T 1 2 /A -T (5.2) 0,1,... and 11 l /A < Dk(O),')< T 1 -TT 1 /A, E[O, A),k= T 12 /A - .5 T 1 < (1/A) (5.3) 0A Dk(c, ) d <.5T1 , k = 0,1,.... Proof: Using an induction argument with Prop. A.5 and Prop. A.7 one can show that T 1 2 /A - T 1 Dk(Co,O-) for k = 0,1,2.... Hence, from Prop. A.7 and Prop. A.8, equation (5.2) follows. Equation (5.3) follows immediately from (5.2) Remark: Note that (5.3) implies that the error range is T 1( 1 - T 1 / A ) which approaches zero as the clocked load, T 1 , approaches zero and as the high prioirty utilization, T 1 /A, approaches 1. Note also that (5.3) shows that the bounds of the average error are A asymmetric with respect to (1/A)J Dk(O,r) dr and if.5T 1 2 /A were added to the value A of (I/A) JBAk(CO,') dt then the error bounds would be symmetric. 6. ACCURACY OF THE COMPLETION TIME DISTRIBUTION If an ordinary customer arrives to find a system backlog level BR(o) then the expected value of the completion time, E[U2 ] will equal the E[BR(b)] plus the expected value of the priority load that arrives during U 2 . The number of clocked loads that arrive during U2 is between U 2/A - 1 and U 2/A+ 1. The average load of each clocked load is E[T 1]. Hence, E[BR()] +(E[U 2 ]/A - 1) E[T1] < E[U2 ] Therefore, 12 E[BR(o)] +( E[U2]/A+ 1) E[T 1] (6.1) ( EBR()] - E[T1]) / ( 1- P ) E[U2] 5 (EIBR()] + E[T 1] ) / ( 1 - P ) where Pi = E[T 1 ] /A. (Note that (6.1) corresponds to the formula (6.2) E[U2 = EBR(-)] / ( 1- Pi ) which holds if the the high priority load is instead Poisson distributed[KS 1].) If the priority load is random then, from (5.1) (6.3) E[BA(e)] - A < E[BR(o)] < E[BA(°o)] + E[T ].1 Hence, from (6.1) and (6.3), E[U2] < E[BA()] + 2E[T 1] 1 - P1 E[BA(00)] - A -E[T 1- P1 - One can show [KS1] that (3.1) implies that (6.4) E[U2A] = E[BA(c)] + E[T 2] 1 -P The error incurred is then A + E[T]+ E[T 2 ] (6.5) 1 -P 1 < E[U 2] - E[U2A] < 2E[T1 ] - E[T2 ] 1 - P1 and the relative error incurred'is (6.6) - A + E[TI] + E[T 2] E[BA(o)] - (A+ E[T 1]) provided E[BA(o)] > A + E[T1]. From (3.1) and (6.4) 13 < E[U EIU2A] 2E[T 1 ] - E[T 2] E[BA()] - (A+ E[TI]) E[^A(c)] (6.7) 2 EBA (6.7) + ,2E[T22] 1 /D 2 2(1-pl-p2) so, from (6.6) and (6.7) A+E[T,]+E[T 2 ] .5a 12 /A+.5X2E[T2 2 -(A+E[TI])(1-pl-P2) (6.8) - E[U-E[U2A] E[U2 ] (1-Pl-P2) 2E[T1]-E[T2 < .5a12/A+.5)%2 E[T 2 2 ]-(A+ET 1])(l-p-PlP2) Note that as the system load p1+ p2 aproaches 1 the error approaches zero. 7. THE TAIL DISTRIBUTION As a special case of Kingman's heavy traffic theorem [K4] , one sees that for any M/G1 system with finite E[T 2], the ergodic waiting time WOO is such that P[WJE[Wo] > x] converges to e -x when the traffic intensity p goes to 1. For an M/G/1 system, the virtual FIFO waiting time at ergodicity and the ergodic backlog coincide. For the distributed Poisson approximation the ordinary customers with FIFO discipline have Poisson arrivals and have an effective servcie time Teff induced by the interruptions at Poisson epochs of the preempting tasks. For this effective time one has [K3] E[exp(-sTeff ) ] = aT( s + - XaI(s).). Kingman's theorem is thereby seen to be directly applicable to the waiting time at ergodicity of the ordinary customers under the distributed Poisson approximation. The accuracy of the distributed Poisson approximation inferred from the error bounds, then implies that when ps is near one, say larger than .75, the ergodic FIFO waiting time distribution of the ordinary customers will be exponentially distributed to good approximation. The completion time is the waiting time plus the effective service time induced by the interruptions. 8. COMPARISON WITH COMPUTER SIMULATION 14 Tables 8.1, 8.2 and 8.3 summarizes some computer simulations that illustrate the accuracy of equation (3.1). In Table 8.1 and Table 8.2 the high priority load, T 1, is deterministic and the low priority load, T 2 , is Erlang-2. In Table 8.3, T 1 is exponential and T 2 , is Erlang-2.The tables list simulated values of U2 along with 98% confidence interval In the examples the high priority utilization is between 1% and 40% and the low priority utilization is between 10% and 20%. In Table 8.1 all of the predictions are within the confidence interval of the simulations. The examples in Table 8.2 are identical to those of Table 8.1 except that the clock intervals, A, are increased by a factor of 10 times and the clocked load, T 1, are decreased by a factor of 10. Although the accuracy of the predictions is less with this change one might note that the predicted value minus the simulated value is always between 0 and .1T1. The examples in Table 8.3 are identical to those of Table 8.2 except that the clock load is exponentially distributed. Here, all of the predictions are within the confidence interval of the simulations. 9. DISCUSSION In this paper, motivated by de Finitti's Theorem, an approximation to a clock schedule with preemptive resume infinitely divisible loads was introduced and using computer simulations was shown to be accurate. The key assumption was to replace a periodic infinitely divisible high priority load by a sequence of Poisson compound processes. This permited previous analysis of preemptive resume Poisson systems to be used. Acknowledgment: The authors wish to thank T. Tedijanto for using the University of Maryland version of PAWS [M1] to create computer simulations necessary for Tables 8.1, 8.2 and 8.3. This paper is dedicated to Amelia T. Servi. 15 REFERENCES: [Al] Ackroyd, M. H., " Numerical Computation of Delays in Clocked Schedules", AT&T Technical Journal, Vol. 64, No. 2, 1985, pp.617-631. [A2] Ackroyd,, M. H., "Stationary and Cyclostationary Finite Buffer Behaviour Computation via Levinson's Method," AT&T Bell Lab. Tech. J., Vol. 63, No. 10, (December, 1984), pp. 2159-2170. [D] Doshi, B. T., "Analysis of Clocked Schedules - High Priority Tasks", AT&T Technical Journal, Vol. 64, No. 2, 1985, pp. 633-660. [F] Feller, W., "An Introduction to Probability Theory and Its Applications", Vol. 2, John Wiley and Sons, New York, 1971. [F1] Fredericks, A. A., "Analysis and Design of Processor Schedules for Real Time Applications", Applied Probability - Computer Science Interface, Vol. 1, 1981, Boca Raton, Florida, pp. 433-451. [F2] Fredericks, A. A., and B. L. Farrell, and D. F. DeMaio, "Approximate Analysis of a Generalized Clocked Schedule", AT&T Technical Journal , Vol. 64, No. 2, 1985, pp. 597-615. [F3] Fredericks, A. A., " A Class of Approximations for the Waiting Time Distribution in a G/G/I Queueing Syste, " B. S. T. J., Vol. 61, No. 3, (March, 1982), pp. 295-325. [K1] Keilson, J. and U. Sumita, "Evaluation of the Total Time in System in a Preempt/ Resume Priority Queue via a Modified Lindley Process, Advances in Applied Probabilit, Vol. 15, pp. 840-859 (1983). [K2] Keilson, J. and L. D. Servi, "Dynamics of the M/G/1 Queue", to appear in Operations Research, (1987). [K3] Keilson, J."Queues Subject to Service Interruption", Annuals of Math. Statis., Vol. 33, No. 4, December, 1962, pp. 1314-1322. 16 [K4] Kingman, J. F. C., " The Heavy Traffic Approximation in the Theory of Queues", Proceedings of the Symposium on Congestion Theory, ed. W. L. Smith and W. E. Wilkinson, 1965, University of North Carolina Press, pp. 137-169. [M1] Melamed, B. "The Performance Analysis Workstation (PAWS 2.0) User Guide and Refernce Manual," UNIX System Toolchest documentation, 1986. [01] Ott, T., "Simple Inequalities for the D/G/1 Queue", unpublished. [02] Ott, T., "The Single Server Queue with Independent GI/G and M/G Input Streams", unpublished. [03] Ott, T. "On the Single Server Queue with Independent GI/G and D/G Input Streams", unpublished. [04] Ott, T, " On the M/G/1 Queue with Additional Inputs", J. Appl. Prob., Vol. 21, 1984, pp. 129-142. [S1] Sahin, I. "Equilibrium Behavior of a Stochastic System with Secondary Input", J. Appl. Prob., Vol. 8, 1971, pp. 252-260. [S2] Sahin, I. and U. N. Bhat, "A Stochastic System with Scheduled Secondary Inputs," Operations Research, Vol 19, 1971, pp. 436-446. [S3] Steutel, F. W., "A Class of Infinitely Divisible Distributions", Ann. Math. Statis. Vol. 39, 1968, pp. 1153-1157. 17 TA 2 T2 U2 Simulation U2 Prediction 0.1 0.001 5 0.02 0.022±.003 0.022 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.001 0.001 0.004 0.004 0.004 0.008 0.008 0.008 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.024±.003 0.036+.009 0.023±.003 0.025±.003 0.037±.006 0.024±.003 0.026±.003 0.043±.009 0.024 0.036 0.023 0.025 0.038 0.024 0.026 0.041 0.05 0.05 0.05 0.05 0.05 0.05 0.05 0.05 0.05 0.001 0.001 0.001 0.004 0.004 0.004 0.008 0.008 0.008 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.022+.003 0.025+.003 0.037±.006 0.024±.003 0.026±.003 0.041±.006 0.026±.003 0.030±.003 0.051+.012 0.022 0.024 0.036 0.024 0.026 0.041 0.026 0.029 0.050 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.001 0.001 0.001 0.004 0.004 0.004 0.008 0.008 0.008 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.023+.003 0.025±.003 0.040±.009 0.028±.003 0.031+.003 0.059±.018 0.038±.003 0.045±.003 0.150±.090 0.023 0.025 0.039 0.028 0.031 0.056 0.038 0.046 0.156 TABLE 8.1 - COMPARISONS OF ANALYSIS WITH SIMULATION TI: deterministic; T2 Erlang-2 18 U T1 A 2 Simulation U 2 Prediction __ 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 0.01 0.01 0.01 0.04 0.04 0.04 0.08 0.08 0.08 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.022± 0.024± 0.036± 0.024± 0.026± 0.039± 0.027+ 0.030± 0.047± 0.001 0.001 0.004 0.001 0.001 0.005 0.001 0.002 0.004 0.022 0.024 0.036 0.023 0.025 0.038 0.024 0.026 0.041 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.01 0.01 0.01 0.04 0.04 0.04 0.08 0.08 0.08 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.022± 0.001 0.025± 0.001 0.036± 0.004 0.025± 0.002 0.028± 0.001 0.044± 0.004 0.033+ 0.001 0.037± 0.002 0.058± 0.010 0.022 0.024 0.036 0.024 0.026 0.041 0.026 0.029 0.050 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.01 0.01 0.01 0.04 0.04 0.04 0.08 0.08 0.08 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.023± 0.002 0.026+ 0.001 0.039± 0.005 0.031± 0.002 0.035± 0.002 0.059± 0.013 0.049± 0.004 0.056± 0.002 0.174± 0.075 0.023 0.025 0.039 0.028 0.031 0.056 0.038 0.046 0.158 TABLE 8.2 - COMPARISONS OF ANALYSIS WITH SIMULATION TI: deterministic; T2: Erlang-2 19 T2 A U2 Simulation U 2 Prediction 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 1.0 0.01 0.01 0.01 0.04 0.04 0.04 0.08 0.08 0.08 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.022± 0.024± 0.036± 0.024± 0.027± 0.040± 0.031± 0.033± 0.054± 0.001 0001 0.003 0.002 0.002 0.007 0.003 0.004 0.010 0.022 0.024 0.036 0.024 0.026 0.040 0.028 0.031 0.049 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.01 0.01 0.01 0.04 0.04 0.04 0.08 0.08 0.08 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.022± 0.001 0.025± 0.002 0.036± 0.003 0.027± 0.002 0.030± 0.002 0.047± 0.007 0.040± 0.006 0.044± 0.007 0.079± 0.025 0.022 0.025 0.037 0.026 0.029 0.045 0.037 0.041 0.073 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.2 0.01 0.01 0.01 0.04 0.04 0.04 0.08 0.08 0.08 5 10 25 5 10 25 5 10 25 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.02 0.024± 0.001 0.026± 0.001 0.039± 0.006 0.036± 0.003 0.041± 0.003 0.077± 0.016 0.092± 0.014 0.118± 0.027 0.401± 0.444 0.023 0.026 0.039 0.035 0.040 0.073 0.092 0.112 0.425 TABLE 8.3 - COMPARISONS OF ANALYSIS WITH SIMULATION TI: exponential; T2 Erlang-2 20 . I H = Time of high r~ H H TIME H H e FIGURE 4.1: CUMULATIVE LOAD VS. TIME SYSTEM AND THE DISTRIBUTED POISSON FOR THE EXACT APPROXIMATION SYSTEM 21 H = Time of high priority arrival L = Time of low priority arrival APPROX I EXACr I cQ H LH TIME H - L H H a FIGURE 4.2: TOTAL SYSTEM BACKLOG VS. TIME FOR THE EXACT SYSTEM AND THE DISTRIBUTED POISSON APPROXIMATION SYSTEM 22 APPENDIX Proof of THEOREM 3.1: From [KS1] Laplace transform of the ergodic time in system for the lower priority traffic is U2 (s) =lim No°a{IPKSN (S + (A. 1) AN - AN BN(S)) a 2 (s + AAN -AN aBN(S))}. Here: a) OBN(S) =E[exp(-sTBN)] where TBN is the busy period of an M/G/1 queue with arrival rate AAN and service time transform aAN(s); b) OPKSN(S) = E[exp(-sWsN)] where WSN is the ergodic waiting time of an M/G/1 queue with arrival rate kSN = AN + X2 and service time transform (A.2) aSN(S) = (XANaAN(S) + 2aC 2 (s) )/XSN From the Takacs equation, (A.3) CBN(S) = AN( S + AN - AN aBN(S) ) so that E[TBN] = E[TAN] / (1 - AN E[TAN] ). One then has from (2.4), (A.4) limN- XAN E[TBN] = iANE[TAN] - XANE[TANI where p is defined in (3.4). By definition, PKSN(S) satisfies the Pollaczek - Khinchine formula, (A.5) OPKSN(S) 1 - PSN 1 - PSN where (A.6) PSN = SNE[TSN] = PS 23 SETSN ] sE[TSN1 P1 1 -P1 which is defined in (3.5). From (A. 1) and (A.5) the average time to completion for the lower priority traffic is (A.7) U 2 = lim N--*(E[WSN] + E[T21 ) /( 1 - Pl ) where, from (2.1), (2.2) and (A.2) E[TSN2] = (C 12 /A + X2E[T 2 2] + (A.8) 2 /NA ) / XSN. Since, from (A.5), (A.9) lim N E[WPKSN] = lim N 2( PS) one has (3.1) using equations (A.7), A.8) and (A.9). The variance of the time to completion of the ordinary customers , (3.2) is found by straightforward but lengthy calculations. · Prop. A.1: If Dk(co, t 0 ) < 0, for some r 0 e [0, A), then Dk(CO,) < 0 in [, A). Proof: From (2.9) that Dk(co,t) is continuous in [0, A). Hence Dk(co,t) can become positive at a time n* in [O, A) only if Dk(co,t) is increasing at '* and Dk(co,*) = 0. Note also that : -WAk(co,t) is a non-increasing function of time and is a point of strict increase for IRk(,t) - IAk(co,T) only if IRk(ox') is increasing and IAk(Co),) is not increasing, i.e.only if BRk(Co,t) = 0 and BAk(co,t) > 0. Hence, from (2.9), is a point of strict increase for Dk(Co,') only if Dk(Co,) = BRk(Co,t) - BAk(co,t) < 0. From this it follows that Dk(o,) will remain non-positive in [ 0 , A). * Note that Prop. A. 1 implies that the process Bk(co,t) is absorbing in the set (bR , bA): bR - bA 0) . Prop A.2: If Dk(Co,T) > 0 and 't0 • A for k = 0,1,... then D(c,'t) is non-increasing at T=to. Proof: If Dk(o,0ro) = BRk(CO,O) - BAk(co,'O) > 0 then BRk(o,SO) 0. Therefore IRk(o,t) is not increasing at Z= Z. Note also that -IAk(Co,Z) - WAk(Co,) cannot be an increasing function of time at ' = 0o. Therefore, from (2.9), Dk(o,Z) is non-increasing at t= to. 24 and WXk(o,'t) is Prop A.3: Every sample path BAk(co,t) with common WAk(o,'t) e [ 0 , A). monotonically non-decreasing in BAk(O,Ot 0 ) for all Proof: Let two such sample paths be labeled BAkj(,t) and BAk2(c,'r). From (2.5), BAkl(o,'t) - BAk2(c0,t) is a continuous function. Furthermore, if for some t', BAkl(c,'t) - BAk2(Co,t') then either both sample paths are zero at ' - tr'or both are strictly positive at X= ''. In either case d/dt ( IAk, (C,T)) = d/dt ( IA2(co,') at t = t'. Therefore, from (2.5), d/dt (BAkl(o,',) - BAk2(co,t)) = 0 at ' = 't'.But if BAkl(co,'t) > and BAkl(O,') < BAk2(cO,') then it must be true that, BAkl(co,t) = BAk2(o,'t0 ) BA2(C,) for some X= t' and BAkl(c,'t) - BAk2(o,t) is strictly decreasing at t = t'. But from the above discussion we showed that this is impossible. · For simplicity the notation A(co,) u v will be employed to denote A(co,v) - A(co,u) for the remainder of the appendix. Prop A.4: If Dk(c,'o) < 0 for some to e [ 0, A) then IRk(,) I O V2 IAk( , ')1 rO v, (A.9) Proof: From Prop. A. 1, for all t e [ t 0 A), Dk(co,t) v [ TO, A) . 0 , i.e, BRk(co,) < BAk(co,). Therefore in the interval [t 0 , A) the cumulative duration that BRk(co,t) is zero cannot be less than the cumulative duration that BAk(cO,t) is zero. Hence (A.9) follows. · Prop. A.5: If Dk(co,0) < 0 then (A.10) Dk(C,) < Tlk(O) - WAk(o,'t), and (A. 11) Dk+l(oJ,0) = Dk(cO),) < 0 e [ 0, A) Proof: From Prop. A.1 there exists to < A such that (A. 12) Dk(cO,t) > 0, for t e [ 0, to) and Dk(co,') < 0 for t e [t, A). If Dk(co,) = BRk(o,t) - BAk(O,t) > 0 for t [0, To) then BRk(CO,'t) > BAk(Wo, ) for t E [0, TO). Hence BAk(c,t) must be idle at least as long as BRk(o,t) is idle. Hence (A. 13) IRk(C, ') [< IA(CO, ), From (2.9) and (A.13), for x £ [0, '0) 25 T [0, 'O). (A.14) Dk(co,') Dk(c,O-)+ Tlk(o) - WAk(co,') < Tlk(co) - WAk(o,). From (A.12) and (2.10) for r e [ 0, A), Dk(co,) <0 < Tlk(CO) - WAk(co,t). Therefore (A.10) follows. (A.11) follows from (A.10) and (2.10).* Prop A.6: For k = 0,1,..., if -min (A, Tlk(c0)) < Dk(c, ) for all T [0,A). Dk(c, 0-) then -min (A, Tlk(cO)) Proof: The proof contains three cases: Case (i): Suppose Tlk(co) < A and Dk(o,0-) = -min (A,Tlk(Co)) = -Tlk(o): In this case Dk(w, 0) = Dk(co,0-) + Tlk(O) = 0 so from Prop. A.4, (A. 15) IRk(Ct, ) - IAk( CD, ) 0, e [Oa) But (2.9), (2.10) and (A.15) implies Dk(O, ) Dk(O, 0-) = -min (A,Tlk(co)) which implies the conclusion of Prop. A.6. Case (ii): Suppose Tlk(co) 2 A and Dk(o,O-) = -min (A,Tlk(o)) = -A: In this case Dk(o,O-) = BRk(Co,0-) - BAk(CO,O-) = -A so BAk(to,0) > A. Because the workoff rate of BAk(co,',) is -1, for all t e [0,A), BAk(co,r) will be non-negative, i.e, it will not be idle. Hence, (A. 16) IAk( to, ) = 0 £ [0). , But from (2.9), (2.10), and (A.16), for ' e [0,A), Dk(co, Tk(co)) which is the conclusion of Prop. A.6 ) > Dk(o, 0-) = -min (A, Case (iii): Suppose Dk(,0-) > -min (A,Tlk()): Two sample paths will be constructed and compared: Suppose Dkl(co,O) = BRkl(co,O) BAkl(CO,0) = Tlk(Co) and Dk2(O,0) = BRk2(O,0 ) - BAk 2(O,0 ) > Tlk(co) where BAk1(Co,0) ŽBAk2(C), 0) and BRkl(Ci,O) = BRk2(c)o, 0) From Prop. A.3 for all £ [0,A), BAkl(), Z) must be greater than BAk2(, t) and by construction, BRkl(o, ) = BRk2(o,). Hence Dk2(co, ) Dkl(co,'). But from Case (i), Dkl(o, ) > -min (A, Tlk(Co)). Hence Dk2(o, r) -min (A, Tlk(CO)) which implies the conclusion of Prop. A.6. Prop A.7: Let Tlk be deterministic and independent of k with Tlk = T 1 < A and -TI(l - T 1 /A) < Dk(c,O-). Then (A.17) T 12 /A - T 1 /A Proof: The proof consists of two cases: 26 Dk(co,t), E [0, A) Case (i): Suppose first that Dk(co,0-) = -Ti(1 - T1/A): If Dk(Co,O-) = BRk(CO,0-) - BAk(C,O-) = -T(1 - T 1/A) then BAk(,O-) T 1(1 - T 1 /A) . If Tlk is deterministic then the backlog of the approximating clock load is increasing at a rate of TA, i.e., (A.18) WAk(o), r) = TI/, x e [0,a) and both Wk(co, x) and IAk(co, r) are, by definition non-negative. Therefore, from (2.5), and (A.18), BAk(C,') T 1(1 - T 1/A) - (1 - T 1 /A) for all x e [0, T 1) and so the approximate system is not idle. Hence (A.19) IA(CO, e£ [0, T 1). ) = 0, If the T 1 is deterministic then Tlk(co) = T 1 for all k and the backlog BRk(C,O-) > 0 and both Wk(co, r) and IRk(C, 'r) are, by definition non-negative.Therefore, from (2.7), for z £ [0, T 1), BRk(co, ) T 1 - and so the real system is not idle. Hence, (A.20) e[0, T 1). IR(CI), ' ) = 0, From (2.9), (A.18),(A.19), and (A.20) and the assumption Dk(c),O-) = -T 1(1 - T 1/A) Dk(c,Z) = T 1 2 /A - T1 / A, (A.21) e[ 0, T 1]. From (A.21), Dk(co, T 1) = O so Prop. A.4 implies (A.22) [ IRk(Co,) - IAk(O, )] IT1 > 0, E [T 1 ,A) From (2.9), for x e [ T1 , A), Dk(co, ) = Dk(co,Tl) + [ IR,(Co,-) - IAk(Co, ) - WA( , .) ]IT1 T which, from (A.18), (A.21), and (A.227) implies (A.17) for e [ T 1 , A). Case (ii) :Suppose instead that -T 1(1 - T 1/A) < Dk(co,0). Using the argument of Prop. A.6, case (ii) the conclusion of this proposition follows Prop. A.8: Let Dk(co,O-) < 0 and let Tlk be deterministic and independent of k with Tlk = T< A. Then one has (A.22) 27 Dk(o,') < T 1 - T 1 /A, 'ze [, A) Proof: If Tlk be deterministic then WAk(o,,t ) = , T 1 /A. Therefore (A.22) folows from Prop. A.5. 28